Matthew Hardeman

202 Followers
370 Following
130 Posts

Software developer. Sysadmin. Into: interconnection, telephony, net engineering, comm. infrastructure, security, snark, birds. 🦝

These days, I'm particularly interested in the intersection of telecom and security/authentication.

(twitter:@mdhardeman)

:twitter:https://twitter.com/mdhardeman
@vcsjones As to pricing? No. They can probably make it feel cheaper, function worse, etc.
@mjg59 Do these people never look to pros for help? Serial-number based key diversification schemes of a solid nature have been around for a long time in the transit system world.
@dalias Indeed. I just shudder at the thought of Kamala Harris as a future nominee.
@dennisfaucher @wbm312 Is that your current API key / credential?
@vcsjones personally my theory is that they imagined every unused bit would be “stolen” by the customer.
@vcsjones Oh god I had no idea there were multiple perversions. My experience with it is H.323 and SS7/ISDN ISUP. Where byte alignment was not at all valued.
@vcsjones Ouch, but I believe you. The Packed Encoding Rules.
@vcsjones if you have the option, avoid the PER coffee at any cost.
@mikemac29 @wjmaggos @mmasnick Yes, I agree, unless they handle this very carefully and reverse course on some things. Which will be to their detriment. Frankly, with most of infosec having made the leap to here, if there aren't hyenas, coyotes, and sneps on my Twitter TL, why am I even logging into Twitter?
@wjmaggos @mmasnick Part of it appears to be an earnest desire to monetize corporate PR accounts and such doing automated posts. Which I think is acceptable. I think they also have lots of commercial opportunities to monetize social graph data and public tweet data, and I think that's fine for them to commercialize too. I think it's silly to charge for automated posting from what we might term "affinity" bots - programmatic entertainment for the masses and such.